1. Why did the spelling and grammar checkers in Word miss the errors highlighted in yellow?

Answers

Answer 1

Answer:

It missed them because the highlighted errors are actually words that are not in the right place and when you misspelled them, it turned into a word in the incorrect place.

Explanation:


Related Questions

Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (current_price * 0.051) / 12.

Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('{:.2f}'.format(your_value))

Ex: If the input is:

200000
210000
the output is:

This house is $200000. The change is $-10000 since last month.
The estimated monthly mortgage is $850.00.

Answers

Answer:

In Python

current = int(input("Current Price: "))

lmonth = int(input("Last Month Price: "))

mortgage = current * 0.051 / 12

print('The house is ${:.2f}'.format(current))

print('The change is ${:.2f}'.format(current-lmonth)+" since last month")

print('The estimated monthy mortgage is ${:.2f}'.format(mortgage))

Explanation:

This gets the current price

current = int(input("Current Price: "))

This gets the last month's price

lmonth = int(input("Last Month Price: "))

This calculates the mortgage

mortgage = current * 0.051 / 12

This prints the house current price

print('The house is ${:.2f}'.format(current))

This prints the change

print('The change is ${:.2f}'.format(current-lmonth)+" since last month")

This prints the estimated mortgage

print('The estimated monthy mortgage is ${:.2f}'.format(mortgage))

does anybody know how to do 6.3 code practice on edhesive. NEED ASAP!!!​

Answers

Answer:

Hopes this helps if not comment and I'll change it

Explanation:

import simplegui

import random

def draw_handler(canvas):

for i in range (0, 1000):

x = random.randint(1, 600)

y = random.randint(1, 600)

r = random.randint(0, 255)

g = random.randint(0, 255)

b = random.randint(0, 255)

color = "RGB( " + str(r) + "," + str(g) + "," + str(b) + ")"

canvas.draw_point((x, y), color)

frame = simplegui.create_frame('Points', 600, 600)

frame.set_canvas_background("Black")

frame.set_draw_handler(draw_handler)

frame.start()

Kelly has always used "P4ssw0rd” as her password on her online accounts. Why should she change this? Check all that apply.

Passwords should be used only once.
It could be easily guessed.
Passwords must be unique.
It contains insufficient personal information.
Passwords should be changed regularly.

Answers

Answer 1, 2, and 3 are all correct. Hope this helps

Answer:

1,2, and 3

Explanation:

Servers can be designed to limit the number of open connections. For example, a server may wish to have only N socket connections at any point in time. As soon as N connections are made, the server will not accept another incoming connection until an existing connection is released. Please write pseudo-code to implement the synchronization using semaphore.

Answers

Answer:

The pseudocode is as follows:

open_server()

connections = N

while (connections>0 and connections <=N):

   if(new_client == connected):

       connections = connections - 1

   for i in 1 to N - connections

   if (client_i == done()):

         releast_client(client_i)

         connections = connections + 1

Explanation:

One of the functions of a semaphore is that, it is a positive variable whose value will never fall below 1. It is often shared among threads in order to keep a process running.

Having said that, what the above pseudocode does is that:

Once the server is opened, it initializes the number of connections to N.

When a new client, the semaphore decreases the number of connections is reduced by 1.

Similarly, when an already connected client is done, the client is released and the number of connections is increased by 1.

This operation is embedded in a while loop so that it can be repeatedly carried out.

what is the portrait mode

Answers

Answer:

Explanation:

When your elecronic devices screen is positioned upright or the way a photo is taken

If you want an example look up portrait mode on go0gle or safar1

You have one address, 196.172.128.0 and you want to subnet that address. You want 10 subnets. 1. What class is this address

Answers

Answer:

This address is by default a class c network

Explanation:

This IP address in this question is a class c network because it has 196 as its first octet. A class c network is one which has its first octet to be between 192 and 223. the class c network begins with a 110 binary.  If ip is between 192 to 223 it belongs to this class. These first 3 octets are the representation of the network number in the address. Class c's were made to support small networks initially.

An expression that returns a value is known as a​

Answers

Answer:

In computer programming, a return statement causes execution to leave the current subroutine and resume at the point in the code immediately after the instruction which called the subroutine, known as its return address. The return address is saved by the calling routine, today usually on the process's call stack or in a register. Return statements in many languages allow a function to specify a return value to be passed back to the code that called the function.

An expression that returns a value is known as a​ function. Check more about function  below.

What is a function?

A function is often seen as a kind of expression or rule, or law that often tells more about a relationship.

Conclusively, a function is known to often returns a value back to the instruction that is known also to be the function. This is regarded as the differences that exist between a method and a function.

Learn more about function  from

https://brainly.com/question/20476366

Notice that the percentages range from just over 55% to just under 65%. This is a range of 10%, so we're going to use 5 evenly-spaced bins (the first bin will go from 55-57, the second bin will go from 57-59, the third bin will go from 59-61, and so on). Let's use the histogram function from the numpy package to help create the histogram. Write the appropriate code to: Import the numpy package as np Execute the np.histogram() function with two arguments: the list that shows the percentage of paid tax preparers (already given in the code cell below) and the bins. Save the result of np.histogram() into a variable called hist (i.e., the line of code should start with hist

Answers

Answer:

import numpy as np

l_int = 55/100

h_int = 65/100

hist = np.histogram( paid_tax_preparers_list, bins=5, range=(l_int, h_int))

Explanation:

Numpy is a Python package used to ease mathematical and statistical research calculations. The package creates data structures called arrays that can be used as vector items, making it easy and fast for calculation to be done.

The np.histogram method is used to create or plot histograms of a list or array against the frequency of the items in the array. The bins and the range attributes are used to adjust the display of the histogram, with bins being the number of bin in the graph and range is the given length of the histogram.

Name 6 examples of how telemedicine is used in healthcare

Answers

Answer:

The digital transmission of medical imaging, remote medical diagnosis and evaluations, and video consultations with specialists are all examples of telemedicine.

Explanation:

Interstate highway numbers Primary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 of 95) go north/south, and evens (like the 10 or 90) go east/west. Auxiliary highways are numbered 100-999, and service the primary highway indicated by the rightmost two digits. Thus, I-405 services 1-5, and I-290 services -90. Given a highway number, indicate whether it is a primary or auxiliary highway. If auxiliary, indicate what primary highway it serves. Also indicate if the (primary) highway runs north/south or east/west. Ex: If the input is 90 the output is I-90 is primary, going east/west. Ex: If the input is 290 the output is I-290 is auxiliary, serving 1-90, going cast/west. Ex: If the input is: 0 the output is O is not a valid interstate highway number. See Wikipedia for more info on highway numbering. main.py Load default templ else 1 nighway_number - int(input) 2 Type your code here. " 4 if highway_number - 0: 5 print(highway_number, 'is not a valid interstate highway number.') 6 if highway_number in range(1, 99-1): 7 if highway..number % 2 - : 8 print('I-' highway number, "is primary, going east/west.") 9 print("I-' highway_number, "is primary, going north/south." 11 else: 12 served - highway_number % 100 13 if highway number - 1000: print highway_number, 'is not a valid Interstate highway number.') 15 if highway number in range(99, 999.1): 16 if highway_number 2 - 0 print('I..highway_number, 'is auxiliary, serving I.', 'x.f.' Xserved, 'going eastwest.) 18 else: print('1', highway_number, 'is auxiliary, rving I-','%.f.' Xserved, 'going north/south.) 10 14 17 19 Develop mode Submit mode When done developing your program press the Submit for grading button below. This will submit your program for auto-grading. Submit for grading Sature of your work Input 90 Your output I- 90 is primary, going east/west. Expected output I-90 is primary, going east/west. 0 2: Auxiliary (290) Output is nearly correct; but whitespace differs. See highlights below. Special character legend Input 290 Your output 1- 290 is auxiliary, serving I- 90, going east/west. I-290 is auxiliary, serving 1-90, going east/west. Expected output 3 Invalid (0) 1/1 Input 0 Your output is not a valid interstate highway number. 4. Compare output 0/2 Output is nearly correct; but whitespace differs. See highlights below Special character legend Input Your output

Answers

Answer:

See attachment for complete solution

Explanation:

The program in your question is unreadable.

So, I started from scratch (see attachment for complete solution)

Using the attached file as a point of reference.

The program has 15 lines

Line 1: Prompt the user for highway number (as an integer)

Line 2: Convert the user input to string

Line 3: Check if highway number is outside 1-999

Line 4: If line 3 is true, print a notice that the input is outside range

Line 5: If line 3 is not true

Line 6: Check if the number of highway digits is 2.

Line 7: If true, Check if highway number is an even number

Line 8: If even, print that the highway is primary and heads east/west

Line 9: If highway number is odd number

Line 10: Print that the highway is primary and heads north/south

Line 11: If the number of highway digits is 3

Line 12: Check if highway number is an even number

Line 13: If even, print that the highway is auxiliary and heads east/west

Line 14: If highway number is odd number

Line 15: Print that the highway is auxiliary and heads north/south

See attachment for complete program

Which of the following is the most appropriate first step to hardening a new Windows installation?
A. creating back-ups of the computer.
B. activating and defining rules for the Windows Firewall.
C. considering the computer's purpose and only installing the features and services needed to fill that purpose.
D. conducting penetration testing on the computer.

Answers

Answer:

C. considering the computer's purpose and only installing the features and services needed to fill that purpose.

Explanation:

Hardening is the process of finding out the vulnerabilities of a system and deploying measures to counter these issues. It is important to install only the features that are needed to fill the purpose of the computer. This is because having lots of unnecessary features will extend the attack surface of the system.

Therefore, the user needs to ensure that only the needed features are installed. Features and applications that have been in the system for a long time should also be uninstalled.

Create an array of that size and then prompt the user for numbers to fill each position in the array. When all of the positions are filled, display the contents of the array to the user. Below is a sample transcript of what your program should do. Text in bold is expected input from the user rather than output from the program.Please enter the number of digits to be stored: 5Enter integer 0: -1Enter integer 1: 10Enter integer 2: 15Enter integer 3: -6Enter integer 4: 3The contents of your array:Number of digits in array: 5Digits in array: -1 10 15 -6 3

Answers

Answer:

In Java

import java.util.Scanner;

public class Main {

  public static void main(String[] args) {

     Scanner input = new Scanner(System.in);

     int arrsize;

     System.out.print("Please enter the number of digits to be stored: ");

     arrsize = input.nextInt();

     int[] myarr = new int[arrsize];

     for (int kount = 0; kount < arrsize; kount++) {

        System.out.print("Enter integer: ");

        myarr[kount] = input.nextInt();      }

     System.out.println("The contents of your array:\nNumber of digits in array: "+arrsize);

     System.out.print("Digits in array: ");

     for (int kount = 0; kount < arrsize; kount++) {

        System.out.print(myarr[kount]+" ");      }

  }

}

Explanation:

This declares the length of the array

     int arrsize;

This prompts the user for the array length

     System.out.print("Please enter the number of digits to be stored: ");

This gets the input for array length

     arrsize = input.nextInt();

This declares the array

     int[] myarr = new int[arrsize];

The following iteration gets input for the array elements

     for (int kount = 0; kount < arrsize; kount++) {

        System.out.print("Enter integer: ");

        myarr[kount] = input.nextInt();      }

This prints the header and the number of digits

     System.out.println("The contents of your array:\nNumber of digits in array: "+arrsize);

     System.out.print("Digits in array: ");

The following iteration prints the array elements

     for (int kount = 0; kount < arrsize; kount++) {

        System.out.print(myarr[kount]+" ");      }

Write an expression that will cause the following code to print "less than 18" if the value of userAge is less than 18.
import java.util.Scanner;
public class AgeChecker {
public static void main (String [] args) {
int userAge;
Scanner scnr = new Scanner(System.in);
userAge = scnr.nextInt(); // Program will be tested with values: 18, 19, 20, 21.
if (/* Your solution goes here */) {
System.out.println("less than 18");
}
else {
System.out.println("18 or more");
}
}
}

Answers

Answer:

Replace /* Your solution goes here */

with: userAge<18

Explanation:

Required

Complete the code

To complete the code, we simply write an expression that compares userAge and 18

From the question, we are to test if userAge is less than 18.

In C++, less than is written as: <

So, the expression that completes the code is: userAge<18

Look at the following assignment statements:

word1 = "rain"
word2 = "bow"

What is the correct way to concatenate the strings?

1 newWord = word1 == word2

2 newWord = word1 + word2

3 newWord = word1 * word2

4 newWord = word1 - word2

Answers

Answer: number 2 is the correct way to do it

Explanation:

Answer:

2 newWord = word1 + word2

Explanation:

digital learning can help students who enjoy

structure and face to face interaction
flexibility and independence
homework and test
classrooms and support

Answers

Answer:

B

Explanation:

Hope this helps! :)

The digital learning can help students who enjoy classrooms and support. The correct option is 4.

What is digital learning?

Digital learning can be defined as a type of education in which the internet, a computer, or a network of computers, and softwares are used to connect students and teachers in order to provide educational services.

Digital learning brings together facilities such as classrooms and support in an effort to help and provide the necessary assistance to students who have chosen the digital medium but still enjoy the comfort of structure and face-to-face interaction.

Regardless of their learning style or preference, digital learning can benefit a variety of students.

It offers a variety of tools and resources to improve the learning experience while also accommodating various schedules and needs.

Thus, the correct option is 4.

For more details regarding digital learning, visit:

https://brainly.com/question/20008030

#SPJ7

Do any of these algorithms (Random Allocation, Round-Robin, Weighted Round-Robin, Round-Robin DNS Load Balancing, and Least Connections) compromise security?

Answers

Answer:

yes and

Explanation:

why do you need to know about a buildings security are you going to rob it ???

While in the Current View command group for notes, which view options do you have available? Check all that apply.


Icon

Notes List

Last 7 Days

Last Month

Last Year

answer: A B C ARE CORRECT

Answers

Answer:

The Answers are A,C,E

Explanation:

Answer:

a b c=Icon,Last 7 Days,Last Month

Explanation:

(Giving brainliest to best answer, don't make an answer if you don't know or its jumble)
A relevant online media source best helps an audience

A) believe the presenter.
B)stay engaged in the topic.
C) understand the topic.
D) trust the material.

Answers

Answer:

B

Explanation:

Answer:

C

Explanation:

I just got it right on an Edge Quiz

lect the correct statement(s) regarding centralized (deterministic) access control on a LAN. a. a centralized node manages the medium access of all connected nodes through polling, tokens, etc. b. CSMA/CD or CSMA/CA are always required to prevent data collisions c. switched Ethernet is an example of centralized/deterministic access control d. all of the above are correct

Answers

Answer:

c

Explanation: thats all you need to know

We can easily improve the formula by approximating the area under the function f(x) by two equally-spaced trapezoids. Derive a formula for this approximation and implement it in a function trapezint2( f,a,b ).

Answers

Answer:

Explanation:

[tex]\text{This is a math function that is integrated using a trapezoidal rule } \\ \\[/tex]

[tex]\text{import math}[/tex]

def [tex]\text{trapezint2(f,a,b):}[/tex]

      [tex]\text{midPoint=(a+b)/2}[/tex]

       [tex]\text{return .5*((midPoint-a)*(f(a)+f(midPoint))+(b-midPoint)*(f(b)+f(midPoint)))}[/tex]

[tex]\text{trapezint2(math.sin,0,.5*math.pi)}[/tex]

[tex]0.9480594489685199[/tex]

[tex]trapezint2(abs,-1,1)[/tex]

[tex]1.0[/tex]

In this exercise we have to use the knowledge of computational language in python to write the code.

the code can be found in the attachment.

In this way we have that the code in python can be written as:

   h = (b-a)/float(n)

   s = 0.5*(f(a) + f(b))

   for i in range(1,n,1):

       s = s + f(a + i*h)

   return h*s

from math import exp  # or from math import *

def g(t):

   return exp(-t**4)

a = -2;  b = 2

n = 1000

result = Trapezoidal(g, a, b, n)

print result

See more about python at brainly.com/question/26104476

1. How many bits would you need to address a 2M × 32 memory if:
a) The memory is byte addressable?
b) The memory is word addressable?
2. How many bits are required to address a 4M × 16 main memory if:
a) Main memory is byte addressable?
b) Main memory is word addressable?
3. How many bits are required to address a 1M × 8 main memory if:
a) Main memory is byte addressable?
b) Main memory is word addreeable?

Answers

Answer:

a) 23       b) 21a) 43        b) 42a) 0          b) 0

Explanation:

1) How many bits is needed to address a 2M * 32 memory

2M = 2^1*2^20, while item =32 bit long word

hence ; L = 2^21 ; w = 32

a) when the memory is byte addressable

w = 8;  L = ( 2M * 32 ) / 8 =  2M * 4

hence number of bits =  log2(2M * 4)= log2 ( 2 * 2^20 * 2^2 ) = 23 bits

b) when the memory is word addressable

W = 32 ; L = ( 2M * 32 )/ 32 = 2M

hence the number of bits = log2 ( 2M ) = Log2 (2 * 2^20 ) = 21 bits

2) How many bits are required to address a 4M × 16 main memory

4M = 4^1*4^20 while item = 16 bit long word

hence L ( length ) = 4^21 ; w = 16

a) when the memory is byte addressable

w = 8 ; L = ( 4M * 16 ) / 8 = 4M * 2

hence number of bits = log 2 ( 4M * 2 ) = log 2 ( 4^1*4^20*2^1 ) ≈ 43 bits

b) when the memory is word addressable

w = 16 ; L = ( 4M * 16 ) / 16 = 4M

hence number of bits = log 2 ( 4M ) = log2 ( 4^1*4^20 ) ≈ 42 bits

3) How many bits are required to address a 1M * 8 main memory

1M = 1^1 * 1^20 ,  item = 8

L = 1^21 ; w = 8

a) when the memory is byte addressable

w = 8 ; L = ( 1 M * 8 ) / 8 = 1M

hence number of bits = log 2 ( 1M ) = log2 ( 1^1 * 1^20 ) = 0 bit

b) when memory is word addressable

w = 8 ; L = ( 1 M * 8 ) / 8 = 1M

number of bits = 0


What is the proper name for C4D5?
O cell
column
Orange
Orow

Answers

Range. If you are referring to the Excel Format, this is a range.

what is computer sences​

Answers

Answer:

Computer science is the study of computers and computing as well as their theoretical and practical applications. Computer science applies the principles of mathematics, engineering, and logic to a plethora of functions, including algorithm formulation, software and hardware development, and artificial intelligence.

In cell 14, calculate


the profit by


subtracting the


donation from the


streaming revenues.

Answers

Answer:

See Explanation

Explanation:

The question is incomplete as the cells that contains donation and streaming revenues are not given

So, I will make the following assumption:

H4 = Donations

G4 =  Streaming Revenues

So, the profit will be:

Enter the following formula in cell I4

=(G4 - H4)

To get the actual solution in your case, replace G4 and H4 with the proper cell names

Make the following statement True by filling in the blank from the choices below: Reliance on information and communications technologies have ____ potential vulnerabilities to physical and cyber threats and potential consequences resulting from the compromise of underlying systems or networks.

Answers

Answer:

Increased.

Explanation:

An information system interacts with its environment by receiving data in its raw forms and information in a usable format.

Information system can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.

Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information systems in order to perform their duties, functions or tasks and to manage their operations effectively. For example, all organizations make use of information systems for supply chain management, process financial accounts, manage their workforce, and as a marketing channels to reach their customers or potential customers.

Additionally, an information system comprises of five (5) main components;

1. Hardware.

2. Software.

3. Database.

4. Human resources.

5. Telecommunications.

Reliance on information and communications technologies have increased potential vulnerabilities to physical and cyber threats and potential consequences resulting from the compromise of underlying systems or networks.

In order to mitigate this physical and cyber threats, information systems usually have an encryption, authentication and authorization system integrated into them.

What are these receivers called?
Each cell is served by at least one fixed-location transceiver. These receivers are known as_______
.

Answers

Answer: Cell site / Base station

Explanation:

A mobile network also referred to as the cellular network is refered to as the radio network which is distributed over the land areas which are refered to as the cells.

We should note that each is served by at least one fixed-location transceiver, which is called the cell site or the base station.

Which of the followings is/are true about RISC (Reduced instruction set computing)?

a. RISC (Reduced instruction set computing) architecture has a set of instructions, so high-level language compilers can produce more efficient code
b. It allows freedom of using the space on microprocessors because of its simplicity.
c. Many RISC processors use the registers for passing arguments and holding the local variables.
d. RISC functions use only a few parameters, and the RISC processors cannot use the call instructions, and therefore, use a fixed length instruction which is easy to pipeline.
e. All of the above.

Answers

Answer:

e. All of the above.

Explanation:

An instruction set architecture (ISA) can be defined as series of native memory architecture, instructions, addressing modes, external input and output devices, virtual memory, and interrupts that are meant to be executed by the directly.

Basically, this set of native data type specifies a well-defined interface for the development of the hardware and the software platform to run it.

The two (2) main types of architectural design for the central processing unit (CPU) are;

I. Complex instruction set computing (CISC): it allows multi-step operation or addressing modes to be executed within an instruction set. Thus, many low-level operations are being performed by an instruction.

II. Reduced instruction set computing (RISC): it allows fixed length instructions and simple addressing modes that can be executed within a clock cycle.

All of the following statements are true about RISC (Reduced instruction set computing) because they are its advantages over complex instruction set computing (CISC);

a. RISC (Reduced instruction set computing) architecture has a set of instructions, so high-level language compilers can produce more efficient code.

b. It allows freedom of using the space on microprocessors because of its simplicity.

c. Many RISC processors use the registers for passing arguments and holding the local variables.

d. RISC functions use only a few parameters, and the RISC processors cannot use the call instructions, and therefore, use a fixed length instruction which is easy to pipeline.

The options that are true about RISC (Reduced instruction set computing) is; E: all of the above

We are dealing with instruction set computing which is a sequence of instructions, addressing modes, external input & output devices, virtual memory, and other interruptions that are designed to be executed by the user directly.

Now, in architectural design meant for the central processing unit (CPU) the benefit of a Reduced instruction set computing (RISC) is that it is a type that allows for a fixed length of instructions with simple addressing styles that can be executed within a clock cycle.

Looking at all the given options, we can say they are all true about RISC (Reduced instruction set computing) as they possess advantages over the other type of instruction set computing called complex instruction set computing (CISC).

Read more about instruction set computing at; https://brainly.com/question/17493537

SOMEONE HELP I HAVE AN MISSING ASSIGNMENT

Answers

Answer:

hardware

Explanation:

hardware in something physical and software in digital

Answer:

Your correct answer is Hardware.

Explanation:

Every single computer is actually composed of these two basic components: hardware and software. hardware includes the Physical features, which are every part that you can either see or touch, for example: monitor, case, keyboard, mouse, and printer.

Select the correct answer from each drop-down menu.

What are the different ways in which you can use a Smart Object for image manipulation?
You can_____
a Smart Object without editing your image pixels directly. Alternately, you can_____
the Smart Object as a separate image even after placing it in a Photoshop image.
Reset Next


1.
A. Remove
B. Scale
C. Darken

2.
A. Lighten
B. Edit
C. Compress

Answers

Answer: A and C

Explanation:I did it before

Use the drop-down menus to complete statements about audio file formats.

The most common file format for consumer storage and playback is ___
The __ audio file was originally used on Apple computers.
The main audio format used in Microsoft Windows is __

Answers

Answer: 1. .mp3 2. .aiff 3. .wav

Explanation:

I got it right

Answer:

.mp3

.aiff

.wav

Explanation:

hope this helps :)

Other Questions
Help Plz ILL GIVE BRAINLIEST! Question 1: Special order Sales volume in units 120 Revenue $8,400 Variable costs $2,400 Contribution margin $6,000 Fixed costs $1,400 Profit $4,600 Special order: A client wants to buy 40 units at a discounted price of $40 per unit. This is a one-time deal (i.e., a short-term decision). You have enough spare capacity to fulfill this special order without cutting back on your regular sales. a) Use the gross approach to decide whether you should take the special order: status quo (no special order) total amounts after adding the special order Revenue $8,400 Variable costs $2,400 Contribution margin $6,000 Fixed costs $1,400 Profit $4,600 Should you take the special order WILL MARK BRAINLEST HELPP ME Definition of mendacious Why are contrast and chiaroscuro an important part of realistic painting?A. Because they are principles of photography, which is morerealistic than painting.B. Because real oSjects have shadows, so an artist must paintshadows to make flat objects look more real.C. Because real objects have vanishing points.D. Because contrast and chiaroscuro were used by ancient artistsand are not an important part of realistic painting. Graham is hiking a trail that is 5 1/2 miles long. He has hiked 3 5/8 miles so far.Which expression shows how many miles he has left to hike? How are single-gene disease different from other types of disease? Which research source would provide the most bias-free information about H. Vondermoots life?A) a newsletter from a horror fiction club B) a brochure from H. Vondermoots fan club C) a selection from a biographical dictionary D) a page from H. Vondermoots publishers website Over what ideas did antislavery reformers disagree? Which taxon group is the largest? *A. DomainB. SpeciesC. PhylumD. Kingdom :i) ii) iii) pls answer fast Remembering the partitioning of Africa, what do you think will happen in Southwest Asia? The length of a table is 8 feet. One a scale drawing, the length is 2 inches. Martin says the scale is 1 inch: 3 feet. Is he correct? (Explain) There are 180 students going on a class field trip. Of those students, 40% are boys. How many students on the field trip are boys? I need help with this, Its not a test or in class assignment. I just need help.. It takes Sam 3 hours to rake the front lawn while his brother, Dave, can rake the lawn in 5 hours. How long will it take them to rake the lawn working together? Round to the nearest tenth. Ophelia dies from... An average football field has the dimensions of 160 ft by 360 ft. If the expressions to find these dimensions were (3x+7) and (7x+3), what value of x would give the dimensions of the football field?x= Answer50 points and brainliest for the best correct answer. In Act, I scene three Anne says, Im going to be remarkable! Im going to Paris to study music and art Im going to be a famous dancer or singer or something wonderful. What dreams do you have for the future? What will you do to leave your mark on the world? What are thermal plasmas?What are thermal plasmas?